Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

Blockchain-enabled trustworthy group communications in UAV networks

K Gai, Y Wu, L Zhu, KKR Choo… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Unmanned Aerial Vehicles (UAVs) are increasingly deployed in networked environments,
such as places of mass gatherings, smart cities and smart nations. For example, UAVs can …

Survey on Secure Keyword Search over Outsourced Data: From Cloud to Blockchain-assisted Architecture

H Wu, B Düdder, L Wang, Z Cao, J Zhou… - ACM Computing …, 2023 - dl.acm.org
Secure keyword search is a prevailing search service offered in outsourced environments.
However, with the increasingly severe security vulnerabilities of conventional centralized …

Towards efficient fine-grained access control and trustworthy data processing for remote monitoring services in IoT

Y Chen, W Sun, N Zhang, Q Zheng… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
As an important application of the Internet of Things, many remote monitoring systems adopt
a device-to-cloud network paradigm. In a remote patient monitoring case, various resource …

Hardware-supported ORAM in effect: Practical oblivious search and update on very large dataset

T Hoang, MO Ozmen, Y Jang, AA Yavuz - Proceedings on Privacy …, 2019 - par.nsf.gov
The ability to query and update over encrypted data is an essential feature to enable breach-
resilient cyber-infrastructures. Statistical attacks on searchable encryption (SE) have …

Bringing decentralized search to decentralized services

M Li, J Zhu, T Zhang, C Tan, Y Xia, S Angel… - … USENIX} Symposium on …, 2021 - usenix.org
This paper addresses a key missing piece in the current ecosystem of decentralized
services and blockchain apps: the lack of decentralized, verifiable, and private search …

Lightweight misbehavior detection management of embedded IoT devices in medical cyber physical systems

G Choudhary, PV Astillo, I You, K Yim… - … on Network and …, 2020 - ieeexplore.ieee.org
We propose a lightweight specification-based misbehavior detection management
technique to efficiently and effectively detect misbehavior of an IoT device embedded in a …

QShield: Protecting outsourced cloud data queries with multi-user access control based on SGX

Y Chen, Q Zheng, Z Yan, D Liu - IEEE Transactions on Parallel …, 2020 - ieeexplore.ieee.org
Due to the concern on cloud security, digital encryption is applied before outsourcing data to
the cloud for utilization. This introduces a challenge about how to efficiently perform queries …

Challenges and new directions in securing spectrum access systems

S Shi, Y Xiao, W Lou, C Wang, X Li… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
The spectrum access system (SAS) is being deployed as a key component of the emerging
spectrum sharing paradigm to address the spectrum crunch facing the US wireless industry …

Toward a secure, rich, and fair query service for light clients on public blockchains

C Cai, L Xu, A Zhou, C Wang - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The rapid growth of storage overhead on public blockchains has urged the use of light
clients that only store a small fraction of blockchain data and rely on other bootstrapped full …